A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Efficient verifiable encryption (and fair exchange) of digital signatures
1999
Proceedings of the 6th ACM conference on Computer and communications security - CCS '99
Such protocols may be used to digitally sign contracts. This paper presents new simple schemes for verifiable encryption of digital signatures. ...
In [2], versfiable eneryptionis introduced as a primitive that can be used to build extremely efficient fair exchange protocols where the items exchanged represent digital signatures. ...
Acknowledgments We are grateful to Victor Shoup for illuminating discussions concerning the topic of this paper. ...
doi:10.1145/319709.319728
dblp:conf/ccs/Ateniese99
fatcat:zr4omvpqz5c4hgwiw3b5wup5xy
Fair Exchange of Digital Signatures using RSA-based CEMBS and Offline STTP
[article]
2009
arXiv
pre-print
While in the third one, the exchange is between confidential data and signature. ...
One of the essential security services needed to safeguard online transactions is fair exchange. ...
FAIR EXCHANGE PROBLEM Fair exchange of digital signatures or documents between two distrusted parties (e.g. individuals or companies) is one of the major issues in e-commerce systems. ...
arXiv:0912.3980v1
fatcat:yms2lod2tjbc5lqn334ubj2wxm
Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures
2011
IEEE Transactions on Information Forensics and Security
In this paper, we fill these gaps by giving the first complete definition of accountability in OFE where one of the exchanged items is a digital signature and a generic (also the first) design of OFE where ...
At the same time, a dishonest third party would compromise the fairness of the exchange and the third party thus must be responsible for its behaviors. ...
Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures I. ...
doi:10.1109/tifs.2011.2109952
fatcat:svzp4o4euvaxhnxbjnmsxmmbzu
An Efficient Certificate-based Verifiable Encrypted Signature Scheme Without Pairings
2015
Open Cybernetics and Systemics Journal
The verifiable encrypted signature is one of the basic fair exchange protocols. There are important applications, such as e-commerce and other cryptographic protocols. ...
Compared with the other existing secure verifiable encrypted signature schemes, our certificate-based verifiable encrypted signature scheme provides greater efficiency and greatly reduces the cost of computation ...
ACKNOWLEDGEMENTS The authors thank the anonymous referees and reviewers for their very valuable comments on this paper. This work is supported by Natural Science Foundation of China (No. ...
doi:10.2174/1874110x01408010239
fatcat:3evvfxeuh5ekbeyfwdflfbys3e
Optimistic fair exchange of digital signatures
2000
IEEE Journal on Selected Areas in Communications
We present a new protocol that allows two players to exchange digital signatures over the Internet in a fair way, so that either each player gets the other's signature, or neither player does. ...
A key feature of our protocol is that a player can always force a timely and fair termination, without the cooperation of the other player. ...
The rest of the proof goes exactly the same, mutatis mutandis, as in the case above where A was honest. ...
doi:10.1109/49.839935
fatcat:24qtpaqseffbrifuahpts4tovi
Optimistic fair exchange of digital signatures
[chapter]
1998
Lecture Notes in Computer Science
We present a new protocol that allows two players to exchange digital signatures over the Internet in a fair way, so that either each player gets the other's signature, or neither player does. ...
A key feature of our protocol is that a player can always force a timely and fair termination, without the cooperation of the other player. ...
The rest of the proof goes exactly the same, mutatis mutandis, as in the case above where A was honest. ...
doi:10.1007/bfb0054156
fatcat:7w3psm4azjhorhvhmha67t6eha
Optimizing One Fair Document Exchange Protocol
2012
International journal of network security and its applications
This paper presents an efficient fair document exchange protocol. The exchange of the documents will be between two parties. ...
This verifiable and recoverable encryption of the document's key will allow one party to verify the encrypted key. ...
Moreover, the concept of verifiable and recoverable encryption of keys is also used. Therefore, more efficient protocol is proposed. ...
doi:10.5121/ijnsa.2012.4101
fatcat:kboho2tv3nfjjo76mekdmfqs2q
Verifiable encryption of digital signatures and applications
2004
ACM Transactions on Privacy and Security
This paper presents a new simple schemes for verifiable encryption of digital signatures. ...
Our schemes can be used as primitives to build efficient fair exchange and certified e-mail protocols. ...
Many thanks to Victor Shoup, Jan Camenisch, and Marc Joye for their insightful comments on the conference paper on verifiable encryption [Ateniese 1999 ], and to Breno de Medeiros for his feedbacks on ...
doi:10.1145/984334.984335
fatcat:2xop7wavorgilfucdaslmosnz4
Ambiguous optimistic fair exchange: Definition and constructions
2015
Theoretical Computer Science
Optimistic fair exchange (OFE) is a protocol for solving the problem of exchanging items or services in a fair manner between two parties, a signer and a verifier, with the help of an arbitrator which ...
Abstract Optimistic fair exchange (OFE) is a protocol for solving the problem of exchanging items or services in a fair manner between two parties, a signer and a verifier, with the help of an arbitrator ...
$ A preliminary version of this paper appeared in Asiacrypt 2008 [25] . This is a vastly extended version. This work is supported by the National Natural ...
doi:10.1016/j.tcs.2014.09.043
fatcat:gbbutkwh3vg6dhcziyzwk6evjm
Breaking and repairing optimistic fair exchange from PODC 2003
2003
Proceedings of the 2003 ACM workshop on Digital rights management - DRM '03
Verifiably committed signatures generalize (non-interactive) verifiably encrypted signatures [8] and two-signatures, both of which are sufficient for fair exchange. ...
By utilizing the stateof-the-art non-interactive two-signature of Boldyreva [6], we obtain an efficient and provably secure (in the random oracle model) fair exchange protocol, which is based on GDH signatures ...
Acknowledgments We thank Alexandra Boldyreva, Jung Min Park, and Victor Shoup for useful discussions concerning fair exchange and comments on this paper. ...
doi:10.1145/947380.947387
dblp:conf/drm/DodisR03
fatcat:axl32ep3abavdgwqb6hpxe7u5i
Breaking and repairing optimistic fair exchange from PODC 2003
2003
Proceedings of the 2003 ACM workshop on Digital rights management - DRM '03
Verifiably committed signatures generalize (non-interactive) verifiably encrypted signatures [8] and two-signatures, both of which are sufficient for fair exchange. ...
By utilizing the stateof-the-art non-interactive two-signature of Boldyreva [6], we obtain an efficient and provably secure (in the random oracle model) fair exchange protocol, which is based on GDH signatures ...
Acknowledgments We thank Alexandra Boldyreva, Jung Min Park, and Victor Shoup for useful discussions concerning fair exchange and comments on this paper. ...
doi:10.1145/947386.947387
fatcat:rfx66lsy5jawjaroa2nc3zklza
Fair and Decentralized Exchange of Digital Goods
[article]
2020
arXiv
pre-print
We introduce a protocol for the data-token exchange where neither party gains more information than what it is paying for, and the exchange is fair: either both parties gets the other's item or neither ...
In this market, buyers and sellers make transactions in a blockchain and interact with a third party, called notary, who has the ability to vouch for the authenticity and integrity of the data. ...
In a fair exchange, two parties wish to exchange a piece of data each holds and is secret to the other. ...
arXiv:2002.09689v1
fatcat:jt5jecvuxreqfiq5v2pamg65ua
Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology
[chapter]
2009
Lecture Notes in Computer Science
One of the more important applications of verifiable encryption is the fair exchange problem: Two par- ...
Verifiable encryption has been used to construct solutions for fair exchange [1, 2], escrow schemes [35] , signature sharing schemes [19] and publicly verifiable secret sharing [40] . ...
In the process we have provided an efficient protocol for verifiable group encryption and improved the efficiency of the protocol for fair exchange of signatures due to Asokan et al. [1]. ...
doi:10.1007/978-3-642-03007-9_17
fatcat:vmjrdwkm7rezrkijibs53th6xq
Fair signature exchange via delegation on ubiquitous networks
2015
Journal of computer and system sciences (Print)
The proposed work includes a novel approach to symmetric-key based verifiable proxy encryption to make the exchange delegation flexible, efficient and simple to implement on resource-limited devices commonly ...
This paper addresses the issue of autonomous fair signature exchange in emerging ubiquitous (u-) commerce systems, which require that the exchange task be delegated to authorised devices for its autonomous ...
Fair Signature Exchange Protocol Based on the verifiable proxy encryption approach proposed in Section 4, we now present a protocol for Proxy-Led Efficient Autonomous Signature Exchange (PLEASE) in u-commerce ...
doi:10.1016/j.jcss.2014.11.001
fatcat:bdqtfbyawzen3m7jad4s26a5ji
Optimistic Fair Exchange in Cloud-Assisted Cyber-Physical Systems
2019
Security and Communication Networks
Fortunately, with the assistance of cloud computing and big data, optimistic fair exchange of digital items in cyber-physical systems (CPSes) can be efficiently managed. ...
To solve the above problems, we use a new technique called verifiably encrypted identity-based signature (VEIS) to construct optimistic fair exchange in cloud-assisted CPSes. ...
Acknowledgments is work was supported by the National Natural Science Foundation of China (No. U17733115). ...
doi:10.1155/2019/5175076
fatcat:wydud2me25afjb67g5r6fzsnga
« Previous
Showing results 1 — 15 out of 3,901 results